Patent application number | Description | Published |
20090105600 | Impedance based device for non-invasive measurement of blood pressure and ankle-brachial index - A device for non-invasive measurement of blood pressure includes a blood pressure cuff, a plethysmographic electrode for acquiring an impedance plethysmogram distal to the cuff and a processing device to inflate and deflate the cuff generate the impedance plethysmogram and to determine the systolic and diastolic blood pressures. The device can be used to measure systolic or diastolic blood pressure or both. It can also be used to take ankle-brachial measurements. An autocorrelation technique can be used to correct noise. | 04-23-2009 |
20090177099 | PERIPHERAL IMPEDANCE PLETHYSMOGRAPHY ELECTRODE AND SYSTEM WITH DETECTION OF ELECTRODE SPACING - In a system and method for peripheral impedance plethysmography, an electrode for application to the patient's limb includes two outer current electrodes and two inner voltage electrodes. A distance between the two inner electrodes is automatically input into an analyzing device, either as a pre-stored value or as determined automatically from the electrode. Peripheral blood flow is calculated in accordance with that distance. | 07-09-2009 |
20100241014 | DEVICE FOR NON-INVASIVE MEASUREMENT OF BLOOD PRESSURE AND ANKLE-BRACHIAL INDEX - A device for non-invasive measurement of blood pressure includes a blood pressure cuff, a plethysmographic electrode for acquiring an impedance plethysmogram distal to the cuff and a processing device to inflate and deflate the cuff, generate the impedance plethysmogram and to determine the systolic and diastolic blood pressures. It is determined when the cuff is completely occluding the extremity, e.g., by detecting pulses at a second, partially occluded cuff or by a photoplethysmogram attached to the big toe. The device can be used to measure systolic or diastolic blood pressure or both. It can also be used to take ankle-brachial measurements. An autocorrelation technique can be used to correct noise. | 09-23-2010 |
20110047406 | SYSTEMS AND METHODS FOR SENDING, RECEIVING AND MANAGING ELECTRONIC MESSAGES - Systems and methods for electronic message may include receiving information from a sending device. The information may include a prioritization determination, initial receiving device destinations, alternate receiving device destinations, and a determination of a plurality of responses to message delivery failures from the sending device. Data may be attached to the message before encrypting and sending. Status information about the message may be received, provided to the sending device, and updated. If message delivery failure occurs, the message may be sent to one or more alternate receiving device destinations. Status information about the message may again be received, provided to the sending device, and updated. Message and status information may be stored in a database. | 02-24-2011 |
20110060201 | Integrated Pulse Oximeter-Pulse Flowmeter - This device uses electrical impedance and signal processing to measure the small change in volume (“Pulse Volume”) of a limb-segment that occurs with each heartbeat. “Pulsatile Flow” is defined as the pulse volume multiplied by the heart rate and is an index of tissue perfusion. This information can be combined with measured blood oxygen saturation to determine how much oxygen is reaching the tissues. The combination of knowing oxygen saturation and tissue perfusion is far more useful than knowing just one or the other of these parameters. | 03-10-2011 |
Patent application number | Description | Published |
20090322489 | MACHINE VISION RFID EXCITER TRIGGERING SYSTEM - Systems and methods are described for triggering interrogation of RFID tags by an RFID system in different interrogation spaces in response to detection of the presence and/or motion of an object using a machine vision system. One embodiment of the invention includes an RFID exciter configured to communicate with a master controller, where the master controller is configured to control activation of the RFID exciter and a video camera connected to an application server, where the application server is configured to communicate with the master controller. In addition, the video camera is configured to provide a video sequence of a scene to the application server, the application server is configured to store information concerning a region of interest within the scene, the application server is configured to detect motion within the region of interest using the video sequence, the application server is configured to send a trigger message to the master controller in response to the detection of motion within the region of interest, and the master controller is configured to activate the RFID exciter in response to receipt of a trigger message from the application server. | 12-31-2009 |
20100165087 | SYSTEM AND METHOD FOR MOSAICING ENDOSCOPE IMAGES CAPTURED FROM WITHIN A CAVITY - Systems and methods for capturing and mosaicking images of one or more surfaces of a collapsed cavity are described. A number of embodiments are capable of performing mosaicking in real time. Many embodiments are configured to perform multiple passes during motion estimation and/or registration to improve the quality of the resulting mosaic(s). One embodiment includes capturing images using an endoscope, where the optics of the endoscope are radially symmetrical, locating the optical center of each of the captured images, dewarping each of the captured images by mapping the image from polar coordinates centered on the optical center of the image to rectangular coordinates, discarding portions of each dewarped image to create high clarity dewarped images, estimating the motion of the endoscope with respect to the interior surface of the cavity that occurred between successive high clarity dewarped images, registering the high clarity dewarped images with respect to each other using the estimates of motion, and combining the registered high clarity dewarped images to create at least one mosaic. | 07-01-2010 |
20120275509 | REGION-OF-INTEREST ENCODING ENHANCEMENTS FOR VARIABLE-BITRATE MEZZANINE COMPRESSION - A specification defining allowable luma and chroma code-values is applied in a region-of-interest encoding method of a mezzanine compression process. The method may include analyzing an input image to determine regions or areas within each image frame that contain code-values that are near allowable limits as specified by the specification. In addition, the region-of-interest method may comprise then compressing those regions with higher precision than the other regions of the image that do not have code-values that are close to the legal limits. | 11-01-2012 |
20130083177 | SYSTEM AND METHOD FOR MOSAICKING ENDOSCOPE IMAGES CAPTURED FROM WITHIN A CAVITY - Systems and methods for capturing and mosaicking images of one or more surfaces of a collapsed cavity are described. One embodiment includes capturing images using an endoscope, where the optics of the endoscope are radially symmetrical, locating the optical center and dewarping each of the captured images by mapping the image from polar coordinates centered on the optical center of the image to rectangular coordinates, discarding portions of each dewarped image to create high clarity dewarped images, estimating the motion of the endoscope with respect to the interior surface of the cavity that occurred between successive high clarity dewarped images, registering the high clarity dewarped images with respect to each other using the estimates of motion, and combining the registered high clarity dewarped images to create at least one mosaic. | 04-04-2013 |
Patent application number | Description | Published |
20090259855 | Code Image Personalization For A Computing Device - A method and apparatus for personalizing a software component to be executed in particular environment are described herein. According to an aspect of the invention, in response to an executable code image representing a software component to be installed in an electronic device, the executable code image is encrypted using an encryption key. The encryption key is then wrapped with a UID that uniquely identifies the electronic device, where the UID is embedded within a secure ROM of the electronic device. The wrapped encryption key and the encrypted executable code image are then encapsulated into a data object to be stored in a storage of the electronic device, such that when the electronic device is subsequently initialized for operation, the executable code image can only be recovered using the UID of the electronic device to retrieve a decryption key in order to decrypt the executable code image. | 10-15-2009 |
20090295461 | DEVICE CONFIGURATION - A process and apparatus for configuring one or more integrated circuits within a device in a manufacturing process is described. In an exemplary process, a device is manufactured by assembling a chip onto a board such as a printed circuit substrate and the chip is fused from power routed across the board to the chip. The power source for the fusing can be generated from the internal power supply on the board or received on a test point on the board itself or a connection interface (e.g. a USB interface) coupled to the board. In an exemplary apparatus, a device comprises a chip with a plurality of fuses that are used to configure the device and a board coupled to the chip, with the board capable of routing power from the board to the chip and the power is used to blow one or more of the plurality of fuses. | 12-03-2009 |
20100005282 | METHOD AND APPARATUS FOR BOOTING FROM A FLASH MEMORY - Techniques for booting a computing device with a flash memory without knowledge of parametric information of the flash memory are described herein. In one embodiment of the invention, the computing device receives input requesting the computing device to begin operation and executes a set of one or more instructions stored in a non-volatile memory. The execution of the set of instructions configures a first read routine for accessing the flash memory based on a common denominator format of candidate flash memories, and the first read routine is not configured based on information located in a flash memory identification table. The computing device reads a bootstrapping code image based on the first read routine into a volatile memory and executes that first bootstrapping code image. Other methods and apparatuses are also described. | 01-07-2010 |
20120210116 | METHOD AND APPARATUS FOR BOOTING FROM A FLASH MEMORY - Techniques for booting a computing device with a flash memory without knowledge of parametric information of the flash memory are described herein. In one embodiment of the invention, the computing device receives input requesting the computing device to begin operation and executes a set of one or more instructions stored in a non-volatile memory. The execution of the set of instructions configures a first read routine for accessing the flash memory based on a common denominator format of candidate flash memories, and the first read routine is not configured based on information located in a flash memory identification table. The computing device reads a bootstrapping code image based on the first read routine into a volatile memory and executes that first bootstrapping code image. Other methods and apparatuses are also described. | 08-16-2012 |
20150286391 | SYSTEM AND METHOD FOR SMART WATCH NAVIGATION - A method for smartwatch control, including: displaying content from a first content stream at face of the smartwatch, the face including a touchscreen coaxially arranged with a display; tracking a user gesture at the touchscreen; in response to user gesture categorization as a radially inward gesture, setting a second content stream as active, wherein the second content stream is different from the first content stream; and in response to user gesture categorization as a radially outward gesture, determining a direction of the user gesture, in response to the direction being a first direction, performing a positive action on the displayed content and in response to the direction being a second direction opposing the first, performing a negative action on the displayed content. | 10-08-2015 |
Patent application number | Description | Published |
20090141875 | System and Method for Delivery of Voicemails to Handheld Devices - Briefly, a variety of embodiments, including the following, are described: a system embodiment and methods that allow random access to voice messages, in contrast to sequential access in existing system embodiments; a system embodiment and methods that allow for the optional use of voice recognition to enhance usability; and a system embodiment and methods that apply to the area of voicemail. | 06-04-2009 |
20130138608 | MOBILE PLATFORM FILE AND FOLDER SELECTION FUNCTIONALITIES FOR OFFLINE ACCESS AND SYNCHRONIZATION - Systems and methods for folder synchronization and offline synchronization via a mobile platform in a web-based collaboration environment are disclosed. One embodiment includes synchronizing user selected folders and/or sub-folders via the mobile platform, using portable devices including smart phones and tablets using any mobile operating system to allow offline access. Child or sub-folders of the selected folders and/or sub-folders are automatically detected and synchronized for offline access. Any change or new content detected on the client side or on the server side is also synchronized such that the selected folders and/or sub-folders on the client and server sides are up to date. | 05-30-2013 |
20130238969 | UNIVERSAL FILE TYPE PREVIEW FOR MOBILE DEVICES - Systems and methods for providing previews to mobile client devices of files stored in a web-based collaboration platform are disclosed. In one embodiment, a system sends a request to preview a file uploaded to the web-based collaboration platform. The system receives preview information for accessing and manipulating preview of the uploaded file. The preview information includes a scheme for accessing file segments of the preview of the uploaded file. The file segments are byproducts of a conversion of the file from the source format to a target format and have a requested preview format. The system further includes a viewer to access the file segments of the uploaded file using the scheme. The viewer displays the accessed file segments on a touch screen responsive to swiping actions on the touch screen, the swiping actions determined based on the source format. | 09-12-2013 |
20130262210 | CLOUD SERVICE OR STORAGE USE PROMOTION VIA PARTNERSHIP DRIVEN AUTOMATIC ACCOUNT UPGRADES - System and method for cloud service or storage use promotion via partnership driven automatic account upgrades are disclosed. In one aspect, embodiments of the present disclosure include a method, which may be implemented on a system, for receiving a device identifier of a device used to access the cloud service or storage, at a host of the cloud service or storage, and using the device identifier, by the host, to determine whether a promotion currently exists for the device and for identifying details of the promotion. One embodiment further includes, upgrading an account used to access the cloud service or storage in response to determining that the promotion exists. The use of the cloud service or storage can be promoted at the device by a physical or electronic imprint depicting the promotion available when accessed at the device | 10-03-2013 |
20130297680 | SYSTEM AND METHOD FOR A THIRD-PARTY APPLICATION TO ACCESS CONTENT WITHIN A CLOUD-BASED PLATFORM - Techniques are disclosed for using a third-party application to access or edit a file within a cloud-based environment within a cloud-based platform or environment. In one embodiment, a method includes, in the cloud-based environment, responsive to detecting a request to access or edit a file using the third-party application, the file is provided for access or edit using the third-party application. The third-party application includes a user interface which is customized to enable storage of the accessed or edited file to the cloud-based environment. In some embodiments, the third-party application is allowed or restricted to store the accessed file back to the cloud-based environment. | 11-07-2013 |
20130318125 | METADATA ENABLED THIRD-PARTY APPLICATION ACCESS OF CONTENT AT A CLOUD-BASED PLATFORM VIA A NATIVE CLIENT TO THE CLOUD-BASED PLATFORM - Techniques are disclosed for methods, architectures and security mechanisms for a third-party application to access content in a cloud-based platform. In one embodiment, a method includes, receiving, at the third-party application, metadata that identifies the file. The method further includes transmitting the metadata to a server which is associated with the third-party application. The metadata enables the server to request the file from the cloud-based environment. | 11-28-2013 |
20130318586 | IDENTIFICATION VERIFICATION MECHANISMS FOR A THIRD-PARTY APPLICATION TO ACCESS CONTENT IN A CLOUD-BASED PLATFORM - Techniques are disclosed for using a third-party application to access or edit a file within a cloud-based environment within a cloud-based platform or environment. In one embodiment, a method includes, in response to a request to access the content in the cloud-based environment, providing the third-party application with a login view to verify an identity of a user. The login view is generated from a server hosting the environment. The method further includes, upon the verification of the user's identity, providing the requested content to the third-party application. | 11-28-2013 |
20130318593 | METHODS, ARCHITECTURES AND SECURITY MECHANISMS FOR A THIRD-PARTY APPLICATION TO ACCESS CONTENT IN A CLOUD-BASED PLATFORM - Techniques are disclosed for methods, architectures and security mechanisms for a third-party application to access content in a cloud-based platform. In one embodiment, a method includes, providing a third-party application with direct access to content in a cloud-based environment. The third-party application is hosted by an entity different from that of the cloud-based environment. In some embodiments, the direct access to the content in the cloud-based environment is provided to the third-party application and accomplished without a need to access an application that is native to the cloud-based environment. | 11-28-2013 |
20140188620 | SYSTEM AND METHOD FOR DELIVERY OF VOICEMAILS TO HANDHELD DEVICES - Briefly, a variety of embodiments, including the following, are described: a system embodiment and methods that allow random access to voice messages, in contrast to sequential access in existing system embodiments; a system embodiment and methods that allow for the optional use of voice recognition to enhance usability; and a system embodiment and methods that apply to the area of voicemail. | 07-03-2014 |
20150082198 | SYSTEM AND METHOD OF A MULTI-FUNCTIONAL MANAGING USER INTERFACE FOR ACCESSING A CLOUD-BASED PLATFORM VIA MOBILE DEVICES - Techniques are disclosed for implementing an intuitive interface which can facilitate collaboration among the multiple users and collaborators as well as enable utilization of content in a shared space among multiple users in a more effective way. In one embodiment, a method comprises receiving updates regarding activities performed by a user and one or more collaborators on contents in a workspace. The method further comprises displaying, on an interactive user interface, lists of information based on the updates to facilitate interaction from the user with respect to the updates. An example of the lists of information can include an activity and, if one or more files are associated with the activity, thumbnails that represent previews of the one or more files. In some embodiments, the thumbnails can enable the user to interact with the files and/or the collaborators. | 03-19-2015 |
Patent application number | Description | Published |
20090063108 | Compatible trust in a computing device - A method and apparatus for executing a first executable code image having a first version number into a memory of a device in an attempt to establish an operating environment of the device are described. The first executable code image retrieves a second version number from the second executable code image after successfully authenticating the second executable code image. If the first version number and the second version number do not satisfy a predetermined relationship, the second executable code image is prevented from being loaded by the first executable code image. | 03-05-2009 |
20110219252 | Methods and Systems for Power Management in a Data Processing System - Methods and systems for managing power consumption in data processing systems are described. In one embodiment, a data processing system includes a general purpose processing unit, a graphics processing unit (GPU), at least one peripheral interface controller, at least one bus coupled to the general purpose processing unit, and a power controller coupled to at least the general purpose processing unit and the GPU. The power controller is configured to turn power off for the general purpose processing unit in response to a first state of an instruction queue of the general purpose processing unit and is configured to turn power off for the GPU in response to a second state of an instruction queue of the GPU. The first state and the second state represent an instruction queue having either no instructions or instructions for only future events or actions. | 09-08-2011 |
20120185712 | METHODS AND SYSTEMS FOR POWER MANAGEMENT IN A DATA PROCESSING SYSTEM - Methods and systems for managing power consumption in data processing systems are described. In one embodiment, a data processing system includes a general purpose processing unit, a graphics processing unit (GPU), at least one peripheral interface controller, at least one bus coupled to the general purpose processing unit, and a power controller coupled to at least the general purpose processing unit and the GPU. The power controller is configured to turn power off for the general purpose processing unit in response to a first state of an instruction queue of the general purpose processing unit and is configured to turn power off for the GPU in response to a second state of an instruction queue of the GPU. The first state and the second state represent an instruction queue having either no instructions or instructions for only future events or actions. | 07-19-2012 |
20120278597 | COMPATIBLE TRUST IN A COMPUTING DEVICE - A method and apparatus for executing a first executable code image having a first version number into a memory of a device in an attempt to establish an operating environment of the device are described. The first executable code image retrieves a second version number from the second executable code image after successfully authenticating the second executable code image. If the first version number and the second version number do not satisfy a predetermined relationship, the second executable code image is prevented from being loaded by the first executable code image. | 11-01-2012 |
20130024677 | SECURE BOOTING A COMPUTING DEVICE - A method and an apparatus for executing codes embedded inside a device to verify a code image loaded in a memory of the device are described. A code image may be executed after being verified as a trusted code image. The embedded codes may be stored in a secure ROM (read only memory) chip of the device. In one embodiment, the verification of the code image is based on a key stored within the secure ROM chip. The key may be unique to each device. Access to the key may be controlled by the associated secure ROM chip. The device may complete establishing an operating environment subsequent to executing the verified code image. | 01-24-2013 |
20130036298 | SECURELY RECOVERING A COMPUTING DEVICE - A method and an apparatus for establishing an operating environment by certifying a code image received from a host over a communication link are described. The code image may be digitally signed through a central authority server. Certification of the code image may be determined by a fingerprint embedded within a secure storage area such as a ROM (read only memory) of the portable device based on a public key certification process. A certified code image may be assigned a hash signature to be stored in a storage of the portable device. An operating environment of the portable device may be established after executing the certified code. | 02-07-2013 |
20130081124 | TRUSTING AN UNVERIFIED CODE IMAGE IN A COMPUTING DEVICE - A method and an apparatus for configuring a key stored within a secure storage area (e.g., ROM) of a device including one of enabling and disabling the key according to a predetermined condition to execute a code image are described. The key may uniquely identify the device. The code image may be loaded from a provider satisfying a predetermined condition to set up at least one component of an operating environment of the device. Verification of the code image may be optional according to the configuration of the key. Secure execution of an unverified code image may be based on a configuration that disables the key. | 03-28-2013 |
20130283076 | METHODS AND SYSTEMS FOR POWER MANAGEMENT IN A DATA PROCESSING SYSTEM - Methods and systems for managing power consumption in data processing systems are described. In one embodiment, a data processing system includes a general purpose processing unit, a graphics processing unit (GPU), at least one peripheral interface controller, at least one bus coupled to the general purpose processing unit, and a power controller coupled to at least the general purpose processing unit and the GPU. The power controller is configured to turn power off for the general purpose processing unit in response to a first state of an instruction queue of the general purpose processing unit and is configured to turn power off for the GPU in response to a second state of an instruction queue of the GPU. The first state and the second state represent an instruction queue having either no instructions or instructions for only future events or actions. | 10-24-2013 |
20150033030 | SECURELY RECOVERING A COMPUTING DEVICE - A method and an apparatus for establishing an operating environment by certifying a code image received from a host over a communication link are described. The code image may be digitally signed through a central authority server. Certification of the code image may be determined by a fingerprint embedded within a secure storage area such as a read only memory (ROM) of the portable device based on a public key certification process. A certified code image may be assigned a hash signature to be stored in a storage of the portable device. An operating environment of the portable device may be established after executing the certified code. | 01-29-2015 |
Patent application number | Description | Published |
20080200005 | STRUCTURE AND METHOD OF FABRICATING A TRANSISTOR HAVING A TRENCH GATE - An integrated circuit transistor is fabricated with a trench gate having nonconductive sidewalls. The transistor is surrounded by an isolation trench filled with a nonconductive material. The sidewalls of the gate trench are formed of the nonconductive material and are substantially free of unetched substrate material. As a result, the sidewalls of the gate trench do not form an undesired conductive path between the source and the drain of the transistor, thereby advantageously reducing the amount of parasitic current that flows between the source and drain during operation. | 08-21-2008 |
20110124178 | STRUCTURE AND METHOD OF FABRICATING A TRANSISTOR HAVING A TRENCH GATE - An integrated circuit transistor is fabricated with a trench gate having nonconductive sidewalls. The transistor is surrounded by an isolation trench filled with a nonconductive material. The sidewalls of the gate trench are formed of the nonconductive material and are substantially free of unetched substrate material. As a result, the sidewalls of the gate trench do not form an undesired conductive path between the source and the drain of the transistor, thereby advantageously reducing the amount of parasitic current that flows between the source and drain during operation. | 05-26-2011 |
20110140204 | TRANSISTORS WITH AN EXTENSION REGION HAVING STRIPS OF DIFFERING CONDUCTIVITY TYPE AND METHODS OF FORMING THE SAME - Methods of forming transistors and transistors are disclosed, such as a transistor having a gate dielectric over a semiconductor having a first conductivity type, a control gate over the gate dielectric, source and drain regions having a second conductivity type in the semiconductor having the first conductivity type, and strips having the second conductivity type within the semiconductor having the first conductivity type and interposed between the control gate and at least one of the source and drain regions. | 06-16-2011 |
20120037985 | APPARATUS WITH CAPACITIVE COUPLING AND ASSOCIATED METHODS - Transistors are described, along with methods and systems that include them. In one such transistor, a field plate is capacitively coupled between a first terminal and a second terminal. A potential in the field plate modulates dopant in a diffusion region in a semiconductor material of the transistor. Additional embodiments are also described. | 02-16-2012 |
20120313691 | ELECTROMAGNETIC SHIELD AND ASSOCIATED METHODS - Semiconductor devices are described, along with methods and systems that include them. One such device includes a diffusion region in a semiconductor material, a terminal coupled to the diffusion region, and a field plate coupled to the terminal and extending from the terminal over the diffusion region to shield the diffusion region. Additional embodiments are also described. | 12-13-2012 |
20140339648 | TRANSISTORS WITH AN EXTENSION REGION HAVING STRIPS OF DIFFERING CONDUCTIVITY TYPE - A transistor includes a gate dielectric over a semiconductor having a first conductivity type, a control gate over the gate dielectric, source and drain regions having a second conductivity type in the semiconductor having the first conductivity type, and strips having the second conductivity type within the semiconductor having the first conductivity type and interposed between the control gate and at least one of the source and drain regions. | 11-20-2014 |
20150021707 | ELECTROMAGNETIC SHIELD AND ASSOCIATED METHODS - Semiconductor devices are described, along with methods and systems that include them. One such device includes a diffusion region in a semiconductor material, a terminal coupled to the diffusion region, and a field plate coupled to the terminal and extending from the terminal over the diffusion region to shield the diffusion region. Additional embodiments are also described. | 01-22-2015 |
20160093694 | METHODS AND APPARATUSES INCLUDING AN ACTIVE AREA OF A TAP INTERSECTED BY A BOUNDARY OF A WELL - Apparatuses and methods are disclosed. One such apparatus includes a well having a first type of conductivity formed within a semiconductor structure having a second type of conductivity. A boundary of the well intersects an active area of a tap to the well. | 03-31-2016 |
Patent application number | Description | Published |
20110318357 | METHODS AND COMPOSITIONS BASED ON SHIGA TOXIN TYPE 2 PROTEIN - The invention is based on the discovery of the epitope in the Stx2 protein for the 11 E1O antibody. The invention features compositions containing non-full length Stx2 polypeptides that include the 11 E1O monoclonal antibody epitope. The invention also features methods of producing anti-Stx2 antibodies specific for the 11 E1O epitope of the Stx2 protein. Additionally, the invention features methods for treating a subject having, or at risk of developing, a Shiga toxin associated disease (e.g., hemolytic uremia syndrome and diseases associated with | 12-29-2011 |
20130101591 | METHODS AND COMPOSITIONS BASED ON SHIGA TOXIN TYPE 1 PROTEIN - The invention is based on the discovery of the epitope in the Stx1 protein for the 13C4 antibody. The invention features non-full length Stx1 polypeptides that include the epitope for the 13C4 monoclonal antibody epitope. The invention also features methods of producing anti-Stx1 antibodies specific for the 13C4 epitope of the Stx1 protein. Additionally, the invention features methods for treating a subject having, or at risk of developing, a Shiga toxin associated disease (e.g., hemolytic uremia syndrome and diseases associated with | 04-25-2013 |
20140023652 | METHODS AND COMPOSITIONS BASED ON SHIGA TOXIN TYPE 1 PROTEIN - The invention is based on the discovery of the epitope in the Stx1 protein for the 13C4 antibody. The invention features non-full length Stx1 polypeptides that include the epitope for the 13C4 monoclonal antibody epitope. The invention also features methods of producing anti-Stx1 antibodies specific for the 13C4 epitope of the Stx1 protein. Additionally, the invention features methods for treating a subject having, or at risk of developing, a Shiga toxin associated disease (e.g., hemolytic uremia syndrome and diseases associated with | 01-23-2014 |
Patent application number | Description | Published |
20120124138 | METHODS AND SYSTEMS FOR VALIDATING REAL TIME NETWORK COMMUNICATIONS - Methods and systems for managing network communications are described. An example resource management system includes a communications manager configured to access information regarding communication protocols used by corresponding broker systems and to provide message translations based on an origin and/or destination of the message to be transmitted. A message processor is coupled to the communications manager and is configured to serialize incoming and/or outgoing broker messages and to facilitate queuing of incoming and outgoing message traffic with broker systems. A communications configurer is configured to track one or more communication attributes of broker systems and changes thereto to ensure communications between the resource management systems are broker systems are conducted in accordance with the communication attributes of the broker systems. A communications rules provider is configured to determine which broker system is to be communicated with in order to fulfill a resource request. | 05-17-2012 |
20120330697 | METHODS AND SYSTEMS FOR VALIDATING REAL TIME NETWORK COMMUNICATIONS - Methods and systems for managing network communications are described. An example resource management system includes a communications manager configured to access information regarding communication protocols used by corresponding broker systems and to provide message translations based on an origin and/or destination of the message to be transmitted. A message processor is coupled to the communications manager and is configured to serialize incoming and/or outgoing broker messages and to facilitate queuing of incoming and outgoing message traffic with broker systems. A communications configurer is configured to track one or more communication attributes of broker systems and changes thereto to ensure communications between the resource management systems are broker systems are conducted in accordance with the communication attributes of the broker systems. A communications rules provider is configured to determine which broker system is to be communicated with in order to fulfill a resource request. | 12-27-2012 |
20140280598 | METHODS AND SYSTEMS FOR VALIDATING REAL TIME NETWORK COMMUNICATIONS - Methods and systems for managing network communications are described. An example resource management system includes a communications manager configured to access information regarding communication protocols used by corresponding broker systems and to provide message translations based on an origin and/or destination of the message to be transmitted. A message processor is coupled to the communications manager and is configured to serialize incoming and/or outgoing broker messages and to facilitate queuing of incoming and outgoing message traffic with broker systems. A communications configurer is configured to track one or more communication attributes of broker systems and changes thereto to ensure communications between the resource management systems are broker systems are conducted in accordance with the communication attributes of the broker systems. A communications rules provider is configured to determine which broker system is to be communicated with in order to fulfill a resource request. | 09-18-2014 |
20150081352 | METHODS AND SYSTEMS FOR VALIDATING REAL TIME NETWORK COMMUNICATIONS - Methods and systems for managing network communications are described. An example resource management system includes a communications manager configured to access information regarding communication protocols used by corresponding broker systems and to provide message translations based on an origin and/or destination of the message to be transmitted. A message processor is coupled to the communications manager and is configured to serialize incoming and/or outgoing broker messages and to facilitate queuing of incoming and outgoing message traffic with broker systems. A communications configurer is configured to track one or more communication attributes of broker systems and changes thereto to ensure communications between the resource management systems are broker systems are conducted in accordance with the communication attributes of the broker systems. A communications rules provider is configured to determine which broker system is to be communicated with in order to fulfill a resource request. | 03-19-2015 |
20150286963 | METHODS AND SYSTEMS FOR VALIDATING REAL TIME NETWORK COMMUNICATIONS - Methods and systems for managing network communications are described. An example resource management system includes a communications manager configured to access information regarding communication protocols used by corresponding broker systems and to provide message translations based on an origin and/or destination of the message to be transmitted. A message processor is coupled to the communications manager and is configured to serialize incoming and/or outgoing broker messages and to facilitate queuing of incoming and outgoing message traffic with broker systems. A communications configurer is configured to track one or more communication attributes of broker systems and changes thereto to ensure communications between the resource management systems are broker systems are conducted in accordance with the communication attributes of the broker systems. A communications rules provider is configured to determine which broker system is to be communicated with in order to fulfill a resource request. | 10-08-2015 |
Patent application number | Description | Published |
20140143887 | SECURITY MEASURES FOR DATA PROTECTION - This document discusses, among other things, security measures for shielding or protecting data or sensitive signals on an integrated circuit (IC). The systems and methods disclosed herein can allow erasing sensitive data when access is not locked, locking out access to sensitive data during normal operations through both indirect and direct means, and shielding sensitive signals from invasive probing or manipulation. | 05-22-2014 |
20140219442 | SECURE CRYPTO KEY GENERATION AND DISTRIBUTION - This document discusses, among other things, a method of distributing authentication keys that can prevent certain forms of circuit fabrication piracy. In an example, a method can include selecting a number of authentication keys for generation at a key generation computer, generating a random number using a random number generator of the key generation computer, generating the number of authentication keys using the random number and a key generation algorithm stored in the memory of the key generation computer, scrambling each of the number of authentication keys using a scrambling routine executing on the key generation computer, and distributing the scrambled authentication keys to an authorized manufacturers. | 08-07-2014 |
20140223557 | PERMANENT LOCKOUT ATTACK DETECTION - This document discusses, among other things, an attack detection module configured to permanently shut down a slave device after a number of consecutive attacks. | 08-07-2014 |
Patent application number | Description | Published |
20150308534 | ROTORCRAFT VIBRATION ISOLATION SYSTEMS - A rotorcraft vibration isolation system includes a plurality of liquid inertia vibration elimination (LIVE) units mounted on a first rotorcraft surface, an accumulator mounted on a second rotorcraft surface at a location that is remote from locations of the plurality of LIVE units, and a fluid passage to connect the accumulator to the plurality of LIVE units in parallel. The fluid passage has sufficient length to traverse between the location of the accumulator and each location of each LIVE unit. During rotorcraft operation, the second rotorcraft surface experiences lesser periodic vibration than the first rotorcraft surface. | 10-29-2015 |
20160083088 | VIBRATION CONTROL WITH ACTIVE LAG DAMPER - A rotor system includes a hub assembly, a first, second, and third rotor blade rotatably attached to the hub assembly, a first, second, and third damper pivotally attached to the hub assembly and pivotally attached to the first, second, and third rotor blade, respectively, and a control system operably associated with the first, second, and third damper. A method to control vibratory forces exerted on the hub assembly via the first and second rotor blade includes separately controlling a dynamic spring rate of each of the first and second dampers with the control system. | 03-24-2016 |
20160096621 | CABLE CUTTER SYSTEM - Some examples of a cable cutting system include a first cutting apparatus that includes a recess to receive a cable. The system includes a second cutting apparatus separate from and attached to the first cutting apparatus. The second cutting apparatus includes multiple cutting surfaces arranged to cut the cable received at the recess. | 04-07-2016 |
Patent application number | Description | Published |
20160059864 | PRIVACY MANAGEMENT - One or more embodiments of techniques or systems for privacy management are provided herein. In one or more embodiments, privacy management may be provided by adjusting the way a system provides notifications, handles communications, or executes applications based on the presence or positioning of one or more occupants within a vehicle. In other words, a vehicle may provide notifications in a first manner when merely a driver is present but provide notifications in a second manner (e.g., different than the first manner) when an additional occupant is detected. Sensors may be utilized to detect the presence or positioning of occupants and communications or applications may be managed accordingly. In this manner, privacy management is provided, thus enhancing security of applications or communications utilized by occupants of a vehicle, such as a driver, for example. | 03-03-2016 |
20160062635 | APPLICATION MANAGEMENT - One or more embodiments of techniques or systems for application management are provided herein. For example, a system for application management may launch or execute multiple applications, such as a first application and a second application. The system for application management may provide a user with different ways of multi-tasking or ways to switch between applications, such as providing or generating home screen shortcuts for a most recently utilized application or a most frequently launched application. Additionally, the system for application management may enable multi-tasking or swapping of applications when a user double taps a home button, initiates a swipe gesture, hits a task swap button, speaks a voice command, etc. In this manner, application management is provided such that a user may engage in the use of multiple applications or switching between in a quick or efficient manner. | 03-03-2016 |
20160065516 | SYSTEMS AND METHODS FOR SAFE COMMUNICATION - A method and system for use in managing communication messages are provided. The system includes a display unit and one or more processors communicatively coupled to one or more memory devices and the display unit. The one or more processors are programmed to receive an incoming message for a driver of the vehicle, determine if the driver is experiencing a high-intensity situation, automatically respond to the incoming message with a reply message to the sender of the incoming message if the driver is experiencing the high-intensity situation, and automatically notify the driver, after the high-intensity situation has ended, that the incoming message was received. | 03-03-2016 |